US Cyber Command is reportedly going on offense against Russia's power grid

news

U.S. Cyber Command is reportedly going on offense against Russia's power grid by placing "potentially crippling malware" in its systems, The New York Times reported Saturday.

The cyber incursions, authorized to Cyber Command under new authorities that do not require presidential approval, have gotten more "aggressive" and seem to be a warning that the U.S. can respond to Moscow's past cyberattacks, such as the 2016 incursion into the Democratic National Committee and its attack on Ukraine's power grid.


"It has gotten far, far more aggressive over the past year," one senior intelligence official told The Times. "We are doing things at a scale that we never contemplated a few years ago."

The Times writes:

Both General Nakasone and Mr. Bolton, through spokesmen, declined to answer questions about the incursions into Russia's grid. Officials at the National Security Council also declined to comment but said they had no national security concerns about the details of The New York Times's reporting about the targeting of the Russian grid, perhaps an indication that some of the intrusions were intended to be noticed by the Russians.

Given the nature of Cyber Command's work is highly classified, it is not known what the malware being used against Russia is capable of.

However, some insight may be gleaned from a previously-reported program called Nitro Zeus — the code name for an operation that allowed the U.S. to shut down much of Iran's infrastructure ahead of a full-scale war through cyber means.

The plan for Nitro Zeus went much further than Stuxnet — the first known cyber weapon to cause physical damage — allowing the National Security Agency to attack Iran's command-and-control systems, so it would not be able to communicate. It could hack in and disable air defenses, so US or Israeli planes would not be shot down. And systems such as the power grid, communications, and financial systems were all infected or backdoored, in case of war.

"This was an enormous, and enormously complex, program," one participant in the program told The New York Times. "Before it was developed, the US had never assembled a combined cyber and kinetic attack plan on this scale."

Read the full article at The Times >

"It's kind of like the equivalent of dropping a soda can into canyon and putting on a blindfold and going and finding it, because you can't just look down and see it," diver Jeff Goodreau said of finding the wreck.

The USS Eagle 56 was only five miles off the coast of Maine when it exploded.

The World War I-era patrol boat split in half, then slipped beneath the surface of the North Atlantic. The Eagle 56 had been carrying a crew of 62. Rescuers pulled 13 survivors from the water that day. It was April 23, 1945, just two weeks before the surrender of Nazi Germany.

The U.S. Navy classified the disaster as an accident, attributing the sinking to a blast in the boiler room. In 2001, that ruling was changed to reflect the sinking as a deliberate act of war, perpetuated by German submarine U-853, a u-boat belonging to Nazi Germany's Kriegsmarine.

Still, despite the Navy's effort to clarify the circumstances surrounding the sinking, the Eagle 56 lingered as a mystery. The ship had sunk relatively close to shore, but efforts to locate the wreck were futile for decades. No one could find the Eagle 56, a small patrol ship that had come so close to making it back home.

Then, a group of friends and amateur divers decided to try to find the wreck in 2014. After years of fruitless dives and intensive research, New England-based Nomad Exploration Team successfully located the Eagle 56 in June 2018.

Business Insider spoke to two crew members — meat truck driver Jeff Goodreau and Massachusetts Department of Corrections officer Donald Ferrara — about their discovery.

Read More Show Less
(CIA photo)

Before the 5th Special Forces Group's Operational Detachment Alpha 595, before 160th Special Operations Aviation Regiment's MH-47E Chinooks, and before the Air Force combat controllers, there were a handful of CIA officers and a buttload of cash.

Read More Show Less

The last time the world saw Marine veteran Austin Tice, he had been taken prisoner by armed men. It was unclear whether his captors were jihadists or allies of Syrian dictator Bashar al Assad who were disguised as Islamic radicals.

Blindfolded and nearly out of breath, Tice spoke in Arabic before breaking into English:"Oh Jesus. Oh Jesus."

That was from a video posted on YouTube on Sept. 26, 2012, several weeks after Tice went missing near Damascus, Syria, while working as a freelance journalist for McClatchy and the Washington Post.

Now that Tice has been held in captivity for more than seven years, reporters who have regular access to President Donald Trump need to start asking him how he is going to bring Tice home.

Read More Show Less

"Shoots like a carbine, holsters like a pistol." That's the pitch behind the new Flux Defense system designed to transform the Army's brand new sidearm into a personal defense weapon.

Read More Show Less

Sometimes a joke just doesn't work.

For example, the Defense Visual Information Distribution Service tweeted and subsequently deleted a Gilbert Gottfried-esque misfire about the "Storm Area 51" movement.

On Friday DVIDSHUB tweeted a picture of a B-2 bomber on the flight line with a formation of airmen in front of it along with the caption: "The last thing #Millenials will see if they attempt the #area51raid today."

Read More Show Less